812
Chapter 18
■
Disaster Recovery Planning
This poses the question: How might you better inform, train,
or advise Bethany so that
Aaron does not have to relieve her of her position should her notebook be stolen? Bethany
must come to understand and appreciate the importance of keeping sensitive information
secure. It may be necessary to emphasize the potential loss and exposure that comes
with losing such data to wrongdoers, competitors, or other unauthorized third parties.
It may suffi ce to point out to Bethany that the employee handbook clearly states that
employees whose behavior leads to the unauthorized disclosure
or loss of information
assets are subject to loss of pay or termination. If such behavior recurs after a warning,
Bethany should be rebuked and reassigned to a position where she can’t expose sensitive
or proprietary information—that is, if she’s not fi red on the spot.
Keep the impact that theft may have on your operations in mind when
planning your parts inventory. It’s a good idea to keep extra inventory of
items with a high pilferage rate, such as random-access memory (RAM)
chips and laptops. It’s also a good idea to keep such materials in secure
storage and to require employees to sign such
items out whenever they
are used.
Understand System Resilience
and Fault Tolerance
Technical controls that add to system resilience and fault tolerance directly affect availability,
one of the core goals of the CIA security triad (confi dentiality, integrity, and availability). A
primary goal of system resilience and fault tolerance is to eliminate single points of failure.
A
single point of failure (SPOF)
is any component that can cause an entire system to fail.
If a computer has data on a single disk, failure of the disk can cause the computer to fail, so
the disk is a single point of failure. If a database-dependent website includes multiple web
servers all served by a single database server, the database server is a single point of failure.
Fault tolerance
is the ability of a system to suffer a fault but continue to operate. Fault
tolerance is achieved by adding redundant components such as
additional disks within a
redundant array of inexpensive disks (RAID) array, or additional servers within a failover
clustered confi guration.
System resilience
refers to the ability of a system to maintain an acceptable level of
service during an adverse event. This could be a hardware fault managed by fault-tolerant
components, or it could be an attack managed by other controls such as effective intru-
sion detection and prevention systems. In some contexts, it refers to the ability of a system
to return to a previous state after an adverse event. For example,
if a primary server in a
failover cluster fails, fault tolerance ensures that the system fails over to another server.
System resilience implies that the cluster can fail back to the original server after the
original server is repaired.
Understand System Resilience and Fault Tolerance
Do'stlaringiz bilan baham: